Skip to main content

Factors Influencing Adoption of Information Security in Information Systems Projects

  • Conference paper
  • First Online:
New Knowledge in Information Systems and Technologies (WorldCIST'19 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Included in the following conference series:

Abstract

This article deals with information security in information systems projects, which has become vital in a context of cybercrimes and economic spying proliferation. Based on the theoretical research model derived from UTAUT 2 and TAM models, this study seeks to determine the factors that influence the intention to adopt and use information security in Information Systems (IS) projects. Both qualitative and quantitative approaches were employed. Upon data analysis on the SmartPLS 3.2.7 software, the results suggested that: (i) perceived usefulness, habit, and facilitating conditions have a positive influence on the intention to use information security in IS projects; (ii) habit has a positive influence on the use of information security in IS projects. This study surely contributes to enriching the literature in the field of information security where the level of scientific research production remains low.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Information Systems

  2. 2.

    Federal Bureau of Investigation

  3. 3.

    Non-Governmental Organizations

  4. 4.

    Partial Least Square

  5. 5.

    Average Variance Extracted

References

  1. Kotulic, A.G., Clark, J.G.: Why there aren’t more information security research studies. Inf. Manag. 41(5), 597–607 (2004)

    Article  Google Scholar 

  2. Dagorn, N., Poussing, N.: Engagement et pratiques des organisations en matière de gouvernance de la sécurité de l’information. Systèmes d’information Manag. 17(1), 113–143 (2012)

    Article  Google Scholar 

  3. Raufer, X.: De la cyber-jungle au cybermonde. Sécurité Globale 8(4), 5–10 (2016)

    Article  Google Scholar 

  4. Le Cœur, J.: Sécuriser les données personnelles de son entreprise. I2D Inf. données Doc. 53(1), 25–26 (2016)

    Google Scholar 

  5. Wolf, P.: Les menaces numériques aujourd’hui. Sécurité et stratégie 3(1), 44–46 (2010)

    Article  Google Scholar 

  6. Christian, M., Dennis, K., Jochen, W.: Is it worth the effort? A decision model to evaluate resource interactions in IS project portfolios. Paderborn University, Faculty of Business Administration and Economics (2015)

    Google Scholar 

  7. Aïm, R.: Les fondamentaux de la gestion de projet. http://groupe.afnor.org/pdf/fondamentaux-gestion-projet.pdf. Accessed 27 May 2017

  8. Coupe, C., Masanovic, S., Rodet, P.: L’humain au secours d’un management violent: le mode projet. http://www.finyear.com/L-humain-au-secours-d-un-management-violent-le-mode-projet_a11046.html. Accessed 28 June 2017

  9. Chen, A.: Gérer les données personnelles fournies aux applications. I2D Inf. données Doc. 54(3), 47–48 (2017)

    Google Scholar 

  10. Coopers, P.W.: La cybersécurité en France vue par les entreprises: 47% de cyberattaques en moins et des pertes financières divisées par deux en (2016). http://www.pwc.fr/fr/espace-presse/communiques-de-presse/2016/octobre/cybersecurite-france-gsiss.html. Accessed 29 March 2017

  11. Yuan, T., Chen, P.: Data mining applications in E-government information security. Procedia Eng. 29, 235–240 (2012)

    Article  Google Scholar 

  12. Dajoux, J.: La perte de données, une cause importante de faillite des entreprises. https://www.informanews.net/perte-de-donnees-cause-faillite/. Accessed 31 Oct 2018

  13. Venkatesh, V., et al.: Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Inf. Syst. J. 21(6), 527–555 (2011)

    Article  Google Scholar 

  14. Venkatesh, V., Thong, J.Y.L., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. Manag. Inf. Syst. Q. 36(1), 157–178 (2012)

    Article  Google Scholar 

  15. Venkatesh, V., Brown, S.A., Bala, H.: Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)

    Article  Google Scholar 

  16. Gefen, D., Straub, D.: A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Commun. Assoc. Inf. Syst. 16(1), 5 (2005)

    Google Scholar 

  17. Kunstelj, M., Jukić, T., Vintar, M.: Comment tirer pleinement parti des résultats des enquêtes auprès des utilisateurs du gouvernement électronique: le cas de la Slovénie. Revue Internationale des Sci. Adm. 75(1), 129–166 (2009)

    Google Scholar 

  18. Hair Jr., J.F., et al.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage Publications, Thousand Oaks (2016)

    Google Scholar 

  19. Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Dec. Sci. 39(2), 273–315 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Landry Tafokeng Talla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tafokeng Talla, L., Kala Kamdjoug, J.R. (2019). Factors Influencing Adoption of Information Security in Information Systems Projects. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_84

Download citation

Publish with us

Policies and ethics